FIELD OF THE INVENTION
[0001] The disclosure generally relates to a method and a system for verifying user authenticity
in an access control system.
BACKGROUND
[0002] One of the key decisions a user has to make when installing or upgrading a security
system for business or personal use is how to handle access control systems. Each
access control system may have its own distinct set of features, advantages, and disadvantages.
For example, organizations may use one or more of card readers and key cards as their
primary form of access control, keypad readers in conjunction with physical key cards
(card readers) to increase security, or biometric readers. However, these methods
may have multiple shortcomings.
SUMMARY
[0003] Viewed from a first aspect, there is provided a method at an access reader for verifying
authenticity of a user. The method includes detecting, by the access reader, that
the user is in proximity to the access reader based on one of a command received from
the user or an electronic communication device, associated with the user, present
within a predefined threshold distance from the access reader. Furthermore, the method
includes transmitting a signal to the electronic communication device in response
to detecting that the user is in proximity to the access reader, wherein the signal
is indicative of verifying the authenticity of the user. Furthermore, the method includes
receiving, from the electronic communication device, biometric information associated
with the user for verifying the authenticity of the user after transmitting the signal
to the electronic communication device. Furthermore, the method includes verifying,
by the access reader, the authenticity of the user based on the verification of the
biometric information with user data stored in a database in communication with the
access reader.
[0004] The method may include triggering a command to provide access to the user based on
the verification of the authenticity of the user.
[0005] The method may include recording, by the access reader at the database, an access
log associated with the verification of the authenticity of the user.
[0006] The method may include establishing a secure wireless communication link with the
access reader, wherein the wireless communication link may be one of a Bluetooth communication
link, Ultra-wideband communication link, or another near-field communication link.
[0007] Receiving the biometric information may comprise receiving a voice signature from
the user.
[0008] Viewed from a second aspect, there is provided a method at the electronic communication
device for verifying the authenticity of the user. The method includes generating
a prompt message for the user to confirm whether to access the access reader within
a vicinity of the electronic communication device. Furthermore, the method includes
receiving an input associated with biometric information of the user to access the
access reader in response to the generation of the prompt message. Furthermore, the
method includes transmitting, to the access reader, the input associated with the
biometric information of the user, wherein the biometric information is verified by
the access reader to provide access to the access reader.
[0009] Prior to generating the prompt message, the method may include receiving a signal
from the access reader based on the reception of one of a command received from the
user or the electronic communication device, associated with the user, present within
a predefined threshold distance from the access reader, wherein the signal may be
indicative of verifying the authenticity of the user.
[0010] Receiving the input from the user to access the access reader may comprise receiving
an identity of the access reader, from among the plurality of access readers.
[0011] The method may include establishing the secure wireless communication link with the
access reader, wherein the wireless communication link is one of the Bluetooth or
Ultra-wideband communication link(s).
[0012] Viewed from a third aspect, there is provided a system at an access reader for verifying
the authenticity of the user. The system includes an access control engine coupled
with a processor and a memory. The access control engine is configured to detect that
the user is in proximity to the access reader based on one of the command received
from the user or the electronic communication device, associated with the user, present
within the predefined threshold distance from the access reader. Furthermore, the
access control engine is configured to transmit the signal to the electronic communication
device in response to detecting that the user is in proximity to the access reader,
wherein the signal is indicative of verifying the authenticity of the user. Furthermore,
the access control engine is configured to receive, from the electronic communication
device, biometric information associated with the user for verifying the authenticity
of the user after transmitting the signal to the electronic communication device.
Furthermore, the access control engine is configured to verify the authenticity of
the user based on the verification of the biometric information with user data stored
in a database in communication with the access reader.
[0013] The access control engine may be configured to trigger a command to provide access
to the user based on the verification of the authenticity of the user.
[0014] The access control engine may be configured to record, by the access reader at the
database, an access log associated with the verification of the authenticity of the
user.
[0015] The access control engine may be configured to establish a secure wireless communication
link with the access reader, wherein the wireless communication link may be one of
a Bluetooth communication link, Ultra-wideband communication link, or another near-field
communication link.
[0016] The access control engine may be configured to receive the biometric information,
the access control engine is further configured to receive a voice signature from
the user.
[0017] Viewed from a fourth aspect, there is provided a system at the electronic communication
device for verifying the authenticity of a user. The system includes an access control
engine coupled with a processor and a memory. The access control engine is configured
to generate the prompt message for the user to confirm whether to access the access
reader within the vicinity of the electronic communication device. Furthermore, the
access control engine is configured to receive the input associated with biometric
information of the user to access the access reader in response to the generation
of the prompt message. Furthermore, the access control engine is configured to transmit,
to the access reader, the input associated with the biometric information of the user,
wherein the biometric information is verified by the access reader to provide access
to the access reader.
[0018] The access control engine may be configured to, prior to generation of the prompt
message, receive a signal from the access reader based on the reception of one of
a command received from the user or the electronic communication device, associated
with the user, present within a predefined threshold distance from the access reader,
wherein the signal may be indicative of verifying the authenticity of the user.
[0019] The access control engine may be configured to receive the input from the user to
access the access reader, the access control engine is configured to receive an identity
of the access reader, from among the plurality of access readers.
[0020] The access control engine may be configured to establish a secure wireless communication
link with the access reader, wherein the wireless communication link is one of a Bluetooth
or Ultra-wideband communication link(s).
[0021] To further clarify the advantages and features of the methods, systems, and apparatuses,
a more particular description of the methods, systems, and apparatuses will be rendered
by reference to specific embodiments thereof, which are illustrated in the appended
drawings. It is appreciated that these drawings depict only exemplary embodiments
of the invention and are therefore not to be considered limiting of its scope. The
invention will be described and explained with additional specificity and detail in
the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] These and other features, aspects, and advantages of the disclosure will become better
understood when the following detailed description is read with reference to the accompanying
drawings in which like characters represent like parts throughout the drawings, wherein:
FIG. 1 illustrates a block diagram of an access reader for verifying user authenticity
in an access control system;
FIG. 2 illustrates a block diagram of an electronic communication device for verifying
the user authenticity in the access control system;
FIGS. 3A-3B is a flow diagram illustrating a method at the access reader for verifying
user authenticity in the access control system;
FIG. 4 is a flow diagram illustrating the method at the electronic communication device
for verifying user authenticity in the access control system;
FIG. 5 is an example sequence diagram illustrating the method for verifying user authenticity
in the access control system;
FIG. 6 is another example sequence diagram illustrating the method for verifying user
authenticity in the access control system; and
FIGS. 7A-7B is an exemplary scenario illustrating the method for verifying user authenticity
in the access control system.
[0023] Further, skilled artisans will appreciate that elements in the drawings are illustrated
for simplicity and may not have necessarily been drawn to scale. For example, the
flow charts illustrate the method in terms of the most prominent steps involved to
help to improve understanding of aspects of the disclosure. Furthermore, in terms
of the construction of the device, one or more components of the device may have been
represented in the drawings by conventional symbols, and the drawings may show only
those specific details that are pertinent to understanding the embodiments of the
invention so as not to obscure the drawings with details that will be readily apparent
to those of ordinary skill in the art having the benefit of the description herein.
DETAILED DESCRIPTION OF FIGURES
[0024] For the purpose of promoting an understanding of the principles of the invention,
reference will now be made to the embodiment illustrated in the drawings and specific
language will be used to describe the same. It will nevertheless be understood that
no limitation of the scope of the invention is thereby intended, such alterations
and further modifications in the illustrated system, and such further applications
of the principles of the invention as illustrated therein being contemplated as would
normally occur to one skilled in the art to which the disclosure relates.
[0025] It will be understood by those skilled in the art that the foregoing general description
and the following detailed description are explanatory of the invention and are not
intended to be restrictive thereof.
[0026] Reference throughout this specification to "an aspect", "another aspect" or similar
language means that a particular feature, structure, or characteristic described in
connection with the embodiment is included in at least one embodiment of the disclosure.
Thus, appearances of the phrase "in an embodiment", "In one or more embodiments",
and similar language throughout this specification may, but do not necessarily, all
refer to the same embodiment.
[0027] The terms "comprise", "comprising", or any other variations thereof, are intended
to cover a non-exclusive inclusion, such that a process or method that comprises a
list of steps does not include only those steps but may include other steps not expressly
listed or inherent to such process or method. Similarly, one or more devices or sub-systems
or elements or structures or components proceeded by "comprises... a" does not, without
more constraints, preclude the existence of other devices or other sub-systems or
other elements or other structures or other components or additional devices or additional
sub-systems or additional elements or additional structures or additional components.
[0028] The embodiments herein and the various features and advantageous details thereof
are explained more fully with reference to the non-limiting embodiments that are illustrated
in the accompanying drawings and detailed in the following description. Descriptions
of well-known components and processing techniques are omitted so as to not unnecessarily
obscure the embodiments herein. Also, the various embodiments described herein are
not necessarily mutually exclusive, as some embodiments can be combined with one or
more other embodiments to form new embodiments. The term "or" as used herein, refers
to a non-exclusive or unless otherwise indicated. The examples used herein are intended
merely to facilitate an understanding of ways in which the embodiments herein can
be practiced and to further enable those skilled in the art to practice the embodiments
herein. Accordingly, the examples should not be construed as limiting the scope of
the embodiments herein.
[0029] As is traditional in the field, embodiments may be described and illustrated in terms
of blocks that carry out a described function or functions. These blocks, which may
be referred to herein as units or modules or the like, are physically implemented
by analog or digital circuits such as logic gates, integrated circuits, microprocessors,
microcontrollers, memory circuits, passive electronic components, active electronic
components, optical components, hardwired circuits, or the like, and may optionally
be driven by firmware and software. The circuits may, for example, be embodied in
one or more semiconductor chips, or on substrate supports such as printed circuit
boards and the like. The circuits constituting a block may be implemented by dedicated
hardware, or by a processor (e.g., one or more programmed microprocessors and associated
circuitry), or by a combination of dedicated hardware to perform some functions of
the block and a processor to perform other functions of the block. Each block of the
embodiments may be physically separated into two or more interacting and discrete
blocks without departing from the scope of the invention, as defined by the claims.
Likewise, the blocks of the embodiments may be physically combined into more complex
blocks without departing from the scope of the disclosure.
[0030] The accompanying drawings are used to help easily understand various technical features
and it should be understood that the embodiments presented herein are not limited
by the accompanying drawings. As such, the disclosure should be construed to extend
to any alterations, equivalents, and substitutes in addition to those which are particularly
set out in the accompanying drawings. Although the terms first, second, etc. may be
used herein to describe various elements, these elements should not be limited by
these terms. These terms are generally only used to distinguish one element from another.
[0031] One of the key decisions a user has to make when installing or upgrading a security
system for business or personal use is how to handle access control systems. The term
"access control system" refers to physical or technological security measures that
govern entrances and exits from spaces within and around a building. The access control
system includes everything from a physical lock on a door to a key card/ electronic
device that opens specific storage areas. There are several options for access control
readers when installing the access control system (e.g., card readers, keypad readers,
two-factor or multifactor authentication readers, biometric readers, etc.). Each access
control system has its own distinct set of features, advantages, and disadvantages.
[0032] For example, in one scenario, many organizations use card readers as their primary
form of access control. To gain access, card readers use key cards rather than physical
keys or codes. There are two types of access control key card readers, viz., proximity
and magnetic. Both of these key card options enable organizations to view a history
of which cards are used at which entry points, making it simple to narrow down users
in the event of a security incident. The disadvantage of using key card readers is
that users can easily lose or lend their cards, making an organization's security
less effective. In another scenario, keypad readers can be used in conjunction with
physical key cards (card readers) to increase security. These are referred to as two-factor
or multifactor authentication readers. Although two-factor authentication is more
secure than a single access control reader, even this type of access control can be
hacked with a stolen card and personal identification number (PIN). In another scenario,
biometric readers such as fingerprints would be used for access control rather than
key cards or PIN numbers. Biometric access control, especially when combined with
another type of access control reader, is by far the most effective form of security
for organizations seeking the ultimate in access control. Although biometric readers
are effective, they are also more expensive than others. Another disadvantage of using
fingerprints to prove identity and gain access is the resulting high-touch surface,
which may pose a sanitation issue and become an uninvited source of virus and bacteria
transmission.
[0033] In some scenarios, the user may be unable to tap the card readers/electronic device
and/or provide the fingerprint and/or use face recognition mechanism to the access
control system to gain access to entrances and exits from the spaces within and around
the building for a variety of reasons, including having bags in both hands, lab devices
in both hands, speaking to another person, and so on. The present disclosure addresses
the above-mentioned disadvantages or other shortcomings or at least provide a useful
alternative for verifying user authenticity in the access control system.
[0034] Referring now to the drawings, and more particularly to
FIGS. 1 to
7B, where similar reference characters denote corresponding features consistently throughout
the figures, there are shown preferred embodiments.
[0035] FIG. 1 illustrates a block diagram of an access reader 100 for verifying user authenticity
in an access control system. Examples of the access reader 100 include, but not limited
to card readers, keypad readers, two-factor or multifactor authentication readers,
biometric readers, etc.
[0036] In an embodiment, the access reader 100 may include a system 101. The system 101
may include a memory 110, a processor 120, a communicator 130, and an access control
engine 140.
[0037] In an embodiment, the memory 110 may store instructions to be executed by the processor
120 for verifying authenticity of a user, as discussed throughout the disclosure.
The memory 110 may include non-volatile storage elements. Examples of such non-volatile
storage elements may include magnetic hard discs, optical discs, floppy discs, flash
memories, or forms of electrically programmable memories (EPROM) or electrically erasable
and programmable (EEPROM) memories. In addition, the memory 110 may, in some examples,
be considered a non-transitory storage medium. The term "non-transitory" may indicate
that the storage medium is not embodied in a carrier wave or a propagated signal.
However, the term "non-transitory" should not be interpreted that the memory 110 is
non-movable. In some examples, the memory 110 can be configured to store larger amounts
of information than the memory. In certain examples, a non-transitory storage medium
may store data that can, over time, change (e.g., in Random Access Memory (RAM) or
cache). The memory 110 can be an internal storage unit, or it can be an external storage
unit of the access reader 100, a cloud storage, or any other type of external storage.
[0038] The processor 120 may communicate with the memory 110, the communicator 130, and
the access control engine 140. The processor 120 may be configured to execute instructions
stored in the memory 110 and to perform various processes for verifying authenticity
of the user, as discussed throughout the disclosure. The processor 120 may include
one or a plurality of processors, which may be a general-purpose processor, such as,
a central processing unit (CPU), an application processor (AP), or the like, a graphics-only
processing unit such as a graphics processing unit (GPU), a visual processing unit
(VPU), and/or an Artificial intelligence (AI) dedicated processor such as a neural
processing unit (NPU).
[0039] The communicator 130 may be configured to communicate internally between internal
hardware components and with external devices (e.g., server, electronic communication
device, etc.) via one or more networks (e.g., radio technology, bluetooth, bluetooth
low energy (BLE), wireless fidelity (Wi-Fi), etc.), as described in conjunction with
FIG. 5, FIG. 6, FIG. 7A, and FIG. 7B. The communicator 130 may include an electronic
circuit specific to a standard that enables wired or wireless communication. Furthermore,
the communicator 130 may transmit a signal to an electronic communication device when
the user is in proximity to the access reader 100, where the signal is indicative
of verifying the authenticity of the user. Furthermore, the communicator 130 may receive
biometric information associated with the user for verifying the authenticity of the
user after transmitting the signal to the electronic communication device.
[0040] The access control engine 140 may be implemented by processing circuitry such as
logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits,
passive electronic components, active electronic components, optical components, hardwired
circuits, or the like, and may optionally be driven by firmware. The circuits may,
for example, be embodied in one or more semiconductor chips, or on substrate supports
such as printed circuit boards and the like.
[0041] In an embodiment, the access control engine 140 may include a sensor(s) 141, an inputoutput
(I/O) controller 142, a verification engine 143, an access log controller 144, and
an AI engine 145.
[0042] The sensor(s) 141 may be configured to capture sensor data associated with the access
reader 100. Examples of the sensor(s) 141 include, but not limited to, a camera, a
microphone, a temperature sensor, an audio sensor, an accelerometer, a pressure sensor,
a location sensor, a humidity sensor, a global positioning system (GPS) sensor, a
magnetic field sensor, an electric field sensor, a light sensor, an infrared light
sensor, a proximity sensor, a biometric sensor (e.g., fingerprint, iris, facial pattern,
etc.), and so on, as illustrated in FIG. 7A and FIG. 7B. The sensor data is, for example,
a signal transmitted by the sensor(s) 141 in response to physical stimulation. In
another embodiment, the access reader 100 may take a security-related action based
on the security-related data of the sensors(s) 141. The security-related sensor data
or action is data, or an action related to controlling or restricting access to an
area protected by the access reader 100. An example of the area protected by the access
reader 100 is the inside of an object whose access is controlled or restricted by
an apparatus, such as a door, gate, lid, drawer, etc., that can be secured and locked
in a closed position by the access reader 100 that is coupled to the apparatus. The
object includes a house, a building, an automobile, a safe, a container, a cabinet,
and so on.
[0043] In one example embodiment, the security-related data for a motion sensor may indicate
the motion of the door, gate, lid, drawer, or other apparatus to which the access
reader 100 is connected. The motion of the door or other apparatus indicates that
the door or other apparatus is being opened/closed to allow/restrict access to the
area.
[0044] In one example embodiment, the security-related data for a proximity sensor may indicate
that the user is near a door and may attempt to break/open through the door, that
the door is closed or open based on its proximity to a door frame in which the door
is installed, and so on. Furthermore, the proximity sensor's security-related data
includes a count of users who pass by the access reader 100 and the number of users
who enter or exit the protected area. Furthermore, the sensor(s) 141 sends a message
indicating the counts to the owner or administrator of the access reader 100/access
log controller 144, a third party, etc.
[0045] In one example embodiment, the security-related data for a microphone may indicate
that a user is knocking on the door. When the microphone may determine that the user
is knocking on the door, the microphone then sends a signal to a wirelessly connected
light sensor/light bulb, causing the light bulb to illuminate an area near the access
reader 100. For example, the light bulb can illuminate the area in front of the door,
the area inside the house containing the door, and so on.
[0046] In one example embodiment, the security-related data for the proximity sensor may
indicate that the user is within a predetermined distance/ predefined threshold distance
(e.g., 2 meters) of the access reader 100, the access reader 100 may initiate a video
stream to the administrator/owner of the access reader 100 via the camera and an audio
stream via the microphone to the administrator/owner of the access reader 100. The
administrator/owner uses the video stream to see what is going on near the door, and
the access reader 100 may use a two-way audio stream to communicate with the user
who is nearby.
[0047] In one example embodiment, the security-related data may indicate a potential security
issue in which the access reader 100 communicates via a signal to be sent to a speaker/audio
sensor, causing the speaker to emit an alarm sound. In another case, when security-related
data indicates a potential security issue, the access reader 100 may send a signal
that causes the camera to start recording or taking images, for example, to capture
an image or video of a burglar attempting to break into the area protected by the
access reader 100.
[0048] The I/O controller 142 may include an input device(s) and an output device(s). The
input device(s) allows the user to communicate with the access reader 100, as illustrated
in FIG. 5, FIG. 7A, and FIG. 7B. Examples of input devices include, but not limited
to, a keypad, a camera, a microphone, and so on. The user may enter a password, passcode,
or other information using the keypad. When the camera is used as the input device(s),
the camera recognizes the user's face or other identifiable body parts, as well as
physical gestures used for communication. When the input device(s) is/are a microphone,
the user can speak commands, passwords, passphrases, and so on, which the microphone
receives and speech or voice recognition can be used to understand the words spoken,
identify the user, and so on.
[0049] The verification engine 143 may verify the authenticity of the user based on verification
of the biometric information with user data stored at a database (e.g., cloud server)
(not shown in FIG. 1) in communication with the access reader 100, as described in
conjunction with FIG. 5, FIG. 7A, and FIG. 7B. The biometric information may include
a voice signature (e.g., voice command to open the door, "please open the door") from
the user. The verification engine 143 may establish a secure wireless communication
link, by utilizing the communicator 130, with the access reader 100, wherein the wireless
communication link is one of a Bluetooth communication link, ultra-wideband communication
link, or another near-field communication link. The access log controller 144 may
record an access log associated with the verification of the authenticity of the user
in the database.
[0050] A function associated with the AI engine 145 may be performed through the non-volatile
memory, the volatile memory, and the processor 120. One or a plurality of processors
controls the processing of the input data in accordance with a predefined operating
rule or AI model stored in the non-volatile memory and the volatile memory. The predefined
operating rule or AI model is provided through training or learning. Here, being provided
through learning means that, by applying a learning algorithm to a plurality of learning
data, a predefined operating rule or AI model of the desired characteristic is made.
The learning may be performed in a device itself in which AI according to an embodiment
is performed, and/or may be implemented through a separate server/system. The learning
algorithm is a method for training a predetermined target device (for example, a robot)
using a plurality of learning data to cause, allow, or control the target device (e.g.,
access reader 100) to decide or predict the authenticity of the user. Examples of
learning algorithms include, but not limited to, supervised learning, unsupervised
learning, semi-supervised learning, or reinforcement learning.
[0051] The AI engine 145 may consist of a plurality of neural network layers. Each layer
has a plurality of weight values and performs a layer operation through a calculation
of a previous layer and an operation of a plurality of weights. Examples of neural
networks include, but not limited to, convolutional neural network (CNN), deep neural
network (DNN), recurrent neural network (RNN), restricted boltzmann machine (RBM),
deep belief network (DBN), bidirectional recurrent deep neural network (BRDNN), generative
adversarial networks (GAN), and deep Q-networks.
[0052] Although
FIG. 1 shows various hardware components of the access reader 100, but it is to be understood
that other embodiments are not limited thereon. In other embodiments, the access reader
100 may include less or more number of components. Further, the labels or names of
the components are used only for illustrative purpose and does not limit the scope
of the invention. One or more components can be combined to perform the same or substantially
similar functions to verify the authenticity of the user in the access control system.
[0053] FIG. 2 illustrates a block diagram of an electronic communication device 200 for verifying
user authenticity in the access control system. Examples of the electronic communication
device 200 include, but not limited to, a smartphone, a tablet computer, a Personal
Digital Assistance (PDA), an Internet of Things (IoT) device, a wearable device, etc.
[0054] In an embodiment, the electronic communication device 200 may include a system 201.
The system 201 may include a memory 210, a processor 220, a communicator 230, a display
240, a camera 250, and an access control engine 260.
[0055] In an embodiment, the memory 210 may store instructions to be executed by the processor
220 for verifying authenticity of the user, as discussed throughout the disclosure.
The memory 210 may include non-volatile storage elements. Examples of such non-volatile
storage elements may include magnetic hard discs, optical discs, floppy discs, flash
memories, or forms of electrically programmable memories (EPROM) or electrically erasable
and programmable (EEPROM) memories. In addition, the memory 210 may, in some examples,
be considered a non-transitory storage medium. The term "non-transitory" may indicate
that the storage medium is not embodied in a carrier wave or a propagated signal.
However, the term "non-transitory" should not be interpreted that the memory 210 is
non-movable. In some examples, the memory 210 can be configured to store larger amounts
of information than the memory. In certain examples, a non-transitory storage medium
may store data that can, over time, change (e.g., in Random Access Memory (RAM) or
cache). The memory 210 can be an internal storage unit, or it can be an external storage
unit of the electronic communication device 200, a cloud storage, or any other type
of external storage.
[0056] The processor 220 may communicate with the memory 210, the communicator 230, the
display 240, the camera 250, and the access control engine 260. The processor 220
may be configured to execute instructions stored in the memory 210 and to perform
various processes for verifying authenticity of the user, as discussed throughout
the disclosure. The processor 220 may include one or a plurality of processors, maybe
a general-purpose processor, such as a central processing unit (CPU), an application
processor (AP), or the like, a graphics-only processing unit such as a graphics processing
unit (GPU), a visual processing unit (VPU), and/or an Artificial intelligence (AI)
dedicated processor such as a neural processing unit (NPU).
[0057] The communicator 230 may be configured to communicate internally between internal
hardware components and with external devices (e.g., access reader 100) via one or
more networks (e.g., radio technology), as illustrated in FIG. 5, FIG. 6, FIG. 7A,
and FIG. 7B. The communicator 230 may include an electronic circuit specific to a
standard that enables wired or wireless communication.
[0058] The display 240 can accept user inputs and is made of a liquid crystal display (LCD),
a light emitting diode (LED), an organic light emitting diode (OLED), or another type
of display, as illustrated in FIG. 7A, and FIG. 7B. The user inputs may include, but
not limited to, touch, swipe, drag, gesture, voice command, and so on. The camera
250 may include one or more image sensors (e.g., charged coupled device (CCD), complementary
metal-oxide semiconductor (CMOS)) to capture one or more images/image frames.
[0059] The access control engine 260 may be implemented by processing circuitry such as
logic gates, integrated circuits, microprocessors, microcontrollers, memory circuits,
passive electronic components, active electronic components, optical components, hardwired
circuits, or the like, and may optionally be driven by firmware. The circuits may,
for example, be embodied in one or more semiconductor chips, or on substrate supports
such as printed circuit boards and the like.
[0060] In an embodiment, the access control engine 260 may include a prompt message generator
261, an input detector 262, and an AI engine 263. The prompt message generator 261
may generate a prompt message (e.g., voice message, display message, etc.) for the
user to confirm whether to access the access reader 100 within a vicinity of the electronic
communication device 200, as illustrated in FIG. 5. Prior to generating the prompt
message, receiving, by the communicator 230, a signal from the access reader 100 based
on the reception of one of a command (e.g., open the door) received from the user
or the electronic communication device 200, associated with the user, present within
the predefined threshold distance from the access reader 100, where the signal is
indicative of verifying the authenticity of the user.
[0061] The input detector 262 may receive an input (e.g., voice signature) associated with
the biometric information of the user to access the access reader 100 in response
to the generation of the prompt message, as described in conjunction with FIG. 5,
and FIG. 7A. Furthermore, the input detector 262 may receive the input from the user
to access the access reader 100 including receiving an identity of the access reader
100 (e.g., Door-1), from among the plurality of access readers (100n) (e.g., Door-1
to Door-n), not shown in FIG.2. The communicator 230 then may transmit the input associated
with the biometric information of the user to the access reader 100, where the biometric
information is verified by the access reader 100 to provide access to the access reader
100, as illustrated in FIG. 5, FIG. 6, FIG. 7A, and FIG. 7B. The communicator 230
may establish the secure wireless communication link with the access reader 100, where
the wireless communication link is, for example, one of the Bluetooth or ultra-wideband
communication link(s).
[0062] A function associated with the AI engine 263 may be performed through the non-volatile
memory, the volatile memory, and the processor 220. One or a plurality of processors
controls the processing of the input data (e.g., voice signature) in accordance with
a predefined operating rule or AI model stored in the non-volatile memory and the
volatile memory. The predefined operating rule or AI model is provided through training
or learning. Here, being provided through learning means that, by applying a learning
algorithm to a plurality of learning data, a predefined operating rule or AI model
of the desired characteristic is made. The learning may be performed in a device itself
in which AI according to an embodiment is performed, and/or may be implemented through
a separate server/system. The learning algorithm is a method for training a predetermined
target device (for example, a robot) using a plurality of learning data to cause,
allow, or control the target device to decide or predict. Examples of learning algorithms
include, but not limited to, supervised learning, unsupervised learning, semi-supervised
learning, or reinforcement learning.
[0063] The AI engine 263 may consist of a plurality of neural network layers. Each layer
has a plurality of weight values and performs a layer operation through a calculation
of a previous layer and an operation of a plurality of weights. Examples of neural
networks include, but not limited to, convolutional neural network (CNN), deep neural
network (DNN), recurrent neural network (RNN), restricted boltzmann machine (RBM),
deep belief network (DBN), bidirectional recurrent deep neural network (BRDNN), generative
adversarial networks (GAN), and deep Q-networks.
[0064] Although FIG. 2 shows various hardware components of the electronic communication
device 200, but it is to be understood that other embodiments are not limited thereon.
In other embodiments, the electronic communication device 200 may include less or
more number of components. Further, the labels or names of the components are used
only for illustrative purpose and does not limit the scope of the invention. One or
more components can be combined to perform the same or substantially similar functions
to verify the authenticity of the user in the access control system.
[0065] FIGS. 3A-3B is a flow diagram illustrating a method 300 at the access reader 100 for verifying
user authenticity in the access control system. Steps
(301 to
309) may be performed by the access reader 100 to verify the authenticity of the user
in the access control system.
[0066] At step
301, the method 300 may include detecting that the user is in proximity to the access
reader 100 based on one of the command(s) received from the user or the electronic
communication device 200, associated with the user, present within the predefined
threshold distance from the access reader 100, as illustrated in FIG. 5 and FIG. 7B.
[0067] At step
302, the method 300 may include transmitting the signal to the electronic communication
device 200 in response to detecting that the user is in proximity to the access reader
100, where the signal is indicative of verifying the authenticity of the user, as
illustrated in FIG. 5 and FIG. 7B.
[0068] At step
303, the method 300 may include receiving from the electronic communication device 200,
the biometric information associated with the user for verifying the authenticity
of the user after transmitting the signal to the electronic communication device 200,
as illustrated in FIG. 5, FIG. 7A and FIG. 7B. In one embodiment, the biometric information
may include the voice signature from the user.
[0069] At step
304, the method 300 may include verifying the authenticity of the user based on verification
of the biometric information with user data stored in the database in communication
with the access reader 100, as illustrated in FIG. 5 and FIG. 7B.
[0070] At step
305, the method 300 may include determining whether the received biometric information
associated with the user matches the stored biometric information, in the database,
associated with the user, as illustrated in FIG. 5 and FIG. 7B.
[0071] At step
306, the method 300 may include no access in response to determining that the received
biometric information associated with the user does not match the stored biometric
information.
[0072] At step
307, the method 300 may include triggering the command to provide access to the user
in response to determining that the received biometric information associated with
the user matches the stored biometric information, as illustrated in FIG. 5 and FIG.
7B.
[0073] At step
308, the method 300 may include recording the access log associated with the verification
of the authenticity of the user in the database, as illustrated in FIG. 5 and FIG.
7B.
[0074] At step
309, the method 300 may include establishing the secure wireless communication link with
the electronic communication device 200, as illustrated in FIG. 5 and FIG. 7B.
[0075] FIG. 4 is a flow diagram 400 illustrating the method at the electronic communication device
200 for verifying user authenticity in the access control system. Steps
(401 to
404) may be performed by the electronic communication device 200 to verify the authenticity
of the user in the access control system.
[0076] At step
401, the method 400 may include receiving the signal from the access reader 100, where
the signal is indicative of verifying the authenticity of the user, as illustrated
in FIG. 5 and FIG. 7B.
[0077] At step
402, the method 400 may include generating the prompt message for the user to confirm
whether to access the access reader 100 within the vicinity of the electronic communication
device 200, as illustrated in FIG. 5 and FIG. 7B. In one embodiment, prior to generating
the prompt message, the method 400 may include receiving the signal from the access
reader 100 based on reception of one of the command received from the user or the
electronic communication device 200, associated with the user, present within the
predefined threshold distance from the access reader 100, wherein the signal is indicative
of verifying the authenticity of the user.
[0078] At step
403, the method 400 may include receiving the input associated with the biometric information
of the user to access the access reader 100 in response to the generation of the prompt
message, as illustrated in FIG. 5 and FIG. 7B. In one embodiment, the method 400 may
include receiving the input from the user to access the access reader 100 comprises
receiving the identity of the access reader 100, from among the plurality of access
readers (100n).
[0079] At step
404, the method 400 may include transmitting the input associated with the biometric
information of the user, where the biometric information is verified by the access
reader 100 to provide access to the access reader 100, as illustrated in FIG. 5 and
FIG. 7B. In one embodiment, the method 400 may include establishing the secure wireless
communication link with the access reader 100, wherein the wireless communication
link is one of the Bluetooth or Ultra-wideband communication link.
[0080] FIG. 5 is an example sequence diagram illustrating the method for verifying user authenticity
in the access control system 500.
[0081] At step
501, the access reader 100 may detect the user 200A is in proximity to the access reader
based on the command/mobile command (e.g., the voice command "open the door") received
from the user 200A and/or the electronic communication device 200 associated with
the user 200A, when the user 200A is present within the predefined threshold distance
from the access reader 100, which relates to step 301 of FIG. 3. At step
502, the access reader 100 may transmit the signal to the electronic communication device
200 in response to detecting that the user 200A is in proximity to the access reader
100, where the signal is indicative of verifying the authenticity of the user 200A,
which relates to step 302 of FIG. 3.
[0082] At step
503, the electronic communication device 200 may generate the prompt message (e.g., a
message displayed on a screen of the electronic communication device 200 "Please enter
your registered information for validation", a voice message "provide a password to
open the door") for the user 200A to confirm whether or not to access the access reader
100 located near the electronic communication device 200, which relates to step 402
of FIG. 4. In response to the prompt message, the electronic communication device
200 receives input (e.g., voice signature) associated with the user's biometric information
to access the access reader 100, which relates to step 403 of FIG. 4. At step
504, the electronic communication device 200 then may transmit the input associated with
the biometric information of the user 200A to the database (e.g., cloud database 500B)
for verifying the authenticity of the user 200A, which relates to step 404 of FIG.
4.
[0083] At step
505, the cloud database 500B may determine whether the received biometric information
associated with the user 200A matches the stored biometric information associated
with the user 200A, which relates to step 305 of FIG. 3. The cloud database 500B may
trigger the command to provide access to the user 200A in response to determining
that the received biometric information associated with the user 200A matches the
stored biometric information (i.e., valid user), which relates to step 307 of FIG.
3. Further, the cloud database 500B may record the access log associated with the
verification of authenticity of the user 200A at the cloud database 500B, which relates
to step 308 of FIG. 3. Then, the secure wireless communication link establishes between
the access reader 100 and the electronic communication device 200, which relates to
step 309 of FIG. 3.
[0084] At step
506, the electronic communication device 200 may send a message signal to access the
access reader 100 to the user 200A. Example of the message signal includes, but not
limited to a message displayed on the screen of the electronic communication device
200 "Please enter door identity/door number", a voice message "provide a door identity",
a voice message "would you like to open door-100A or 100B or 100N?", etc. , which
relates to step 403 of FIG. 4. At step
507, the access reader 100 may receive the message signal from the user 200A via the
electronic communication device 200. Example of the received message signal includes,
but not limited to a message displayed on the screen of the electronic communication
device 200 "Please confirm by pressing the OK button", a voice message "please open
the door-100A", etc., which relates to step 403 of FIG. 4 At step
508, the access reader 100 may trigger the command to provide access to the user 200A
based on the verification of the authenticity of the user 200A and the received message.
The access reader 100 triggers the command, to building space/door 500A, to provide
access to the user 200A based on the verification of the authenticity of the user
200A and the received message, which relates to step 309 of FIG. 3. At step
509, the access reader 100 may record the access log associated with the verification
of the authenticity of the user 200A in the cloud database 500B, which relates to
step 308 of FIG. 3.
[0085] FIG. 6 is another example sequence diagram illustrating the method for verifying user authenticity
in the access control system 600.
[0086] At steps
601-602, the access reader 100 may detect the user 200A is in proximity to the access reader
100 based on the command/mobile command (e.g., the voice command "open the door")
received from the user 200A and/or the electronic communication device 200 associated
with the user 200A when the user 200A is present within the predefined threshold distance
from the access reader 100, which relates to step 301 of FIG. 3. The access reader
100 speaks to the user 200A via the electronic communication device 200 (e.g., an
application associated with mobile credential access control). At step
603, the electronic communication device 200 may receive the input (e.g., biometric information,
the identity of the access reader 100, etc.) from the user 200A (e.g., a voice message/signature
"please open the door-100A"), which relates to step 403 of FIG. 4. At steps
604-605, the electronic communication device 200 may send the received input to the access
reader 100, which relates to step 404 of FIG. 4. The access reader 100 then verifies
the received input by utilizing the cloud database 500B and the cloud database 500B
triggers the command to provide access to the user 200A when the received biometric
information associated with the user 200A matches the stored biometric information
(i.e., valid user), which relates to step 305 of FIG. 3. Then, the access reader 100
may trigger the command, which relates to step 307 of FIG. 3, to building space/door
500A, to provide access to the user 200A based on the verification of the authenticity
of the user 200A and the received message and the secure wireless communication link
establishes between the access reader 100 and the electronic communication device
200, which relates to step 309 of FIG. 3. At step
606, the access reader 100 may record the access log associated with the verification
of the authenticity of the user 200A in the cloud database 500B, which relates to
step 308 of FIG. 3.
[0087] The various actions, acts, blocks, steps, or the like in the flow/sequence diagrams
may be performed in the order presented, in a different order, or simultaneously.
Further, in some embodiments, some of the actions, acts, blocks, steps, or the like
may be omitted, added, modified, skipped, or the like without departing from the scope
of the invention.
[0088] FIGS. 7A-7B is an exemplary scenario illustrating the method for verifying user authenticity
in the access control system 1000.
[0089] Referring to
FIG. 7A: at an initial stage, the user 200A of the electronic communication device 200 may
pair 701 with the access reader 100 by using various technologies of the electronic
communication device 200, where the access reader 100 mounted on door/wall 500A (building
space/door). Examples of the various technologies include, but not limited to, first
technology as Bluetooth and second technology as WI-FI, etc. Furthermore, the user
200A registers 702 the biometric information with the access reader 100 and/or the
cloud database 500B. Examples of biometric information include, but not limited to,
first biometric as voice signature, second biometric as fingerprint, etc. Furthermore,
the access reader 100 of the door 100A may include various sensors(s) 141 to capture
sensor data, and the input device(s) and the output device(s). Examples of the sensors(s)
141 include, but not limited to, the camera 703, the microphone 704, the biometric
sensor 705, the audio sensor 706, and the proximity sensor (not shown in FIG. 7A).
Examples of the input device(s) include, but not limited to, a keypad 707. Examples
of the output device(s) include, but not limited to, a display 708.
[0090] Referring to
FIG. 7B: The access reader 100 may detect the user 200A is in proximity to the access reader
100 based on the command/mobile command (e.g., the voice command "open the door")
received from the user 200A and/or the electronic communication device 200 associated
with the user 200A when the user 200A is present within the predefined threshold distance
(①) from the access reader 100, which relates to step 501 of FIG. 5. The access reader
100 may transmit the signal (②) to the electronic communication device 200 in response
to detecting that the user 200A is in proximity to the access reader 100, where the
signal is indicative of verifying the authenticity of the user 200A, which relates
to step 502 of FIG. 5.
[0091] The electronic communication device 200 may generate a prompt message (③) (e.g.,
a message displayed 709 on a screen of the electronic communication device 200 "Please
enter your registered information for validation", a voice message "provide a password
to open the door") for the user 200A to confirm whether or not to access the access
reader 100 located near the electronic communication device 200, which relates to
step 503 of FIG. 5. In response to the prompt message, the electronic communication
device 200 may receive input (e.g., voice signature) associated with the user's biometric
information to access the access reader 100, which relates to step 503 of FIG. 5.
The electronic communication device 200 then may transmit (④) the input associated
with the biometric information of the user 200A to the database (e.g., cloud database
500B) for verifying (⑤) the authenticity of the user 200A, which relates to step 504
of FIG. 5. The cloud database 500B determines whether the received biometric information
associated with the user 200A matches the stored biometric information associated
with the user 200A, which relates to step 505 of FIG. 5. The cloud database 500B may
trigger the command to provide access to the user 200A in response to determining
that the received biometric information associated with the user 200A matches the
stored biometric information (i.e., valid user), which relates to step 505 of FIG.
5. Further, the cloud database 500B may record the access log associated with the
verification of authenticity of the user 200A at the cloud database 500B. Then, the
secure wireless communication link may establish between the access reader 100 and
the electronic communication device 200.
[0092] The electronic communication device 200 may send a message signal (⑥) to access the
access reader 100 to the user 200A, which relates to step 506 of FIG. 5. Example of
the message signal includes, but not limited to a message displayed 710 on the screen
of the electronic communication device 200 "Please enter door identity/door number",
a voice message "provide a door identity", a voice message "would you like to open
door-100A or 100B or 100N?", etc. The access reader 100 may receive the message signal
(⑦) from the user 200A via the electronic communication device 200. Example of the
received message signal includes, but is not limited to, a message displayed on the
screen of the electronic communication device 200 "Please confirm by pressing the
OK button", a voice message "please open the door-100A", etc., which relates to step
507 of FIG. 5. The access reader 100 may trigger the command to provide access to
the user 200A based on the verification of the authenticity of the user 200A and the
received message, which relates to step 508 of FIG. 5. The access reader 100 then
may record (⑤) the access log associated with the verification of the authenticity
of the user 200A in the cloud database 500B, which relates to step 509 of FIG. 5.
[0093] Unlike existing methods and systems, the disclosed method/system uses the electronic
communication device 200 (e.g., mobile phones, smartphones, tablets, wearable electronic
devices, and so on) and allows the electronic communication device 200 to serve as
a user's credentials to gain access to, for example, offices or other business facilities
or any organization. As more employers/users promote the Bring Your Own Device (BYOD)
trend, the disclosed method/system shall provide a mechanism for adding an extra layer
of security to any organization. Further, by using the cloud-based encrypted technology,
the disclosed method/system provides secure access to, for example, offices or other
business facilities with just a few clicks on the electronic communication device
200 and ensures a higher level of security. Furthermore, the disclosed method/system
also detects and prevents tailgating. Furthermore, the disclosed method/system provides
a low-cost solution for efficiently managing user credentials identification. Because
of its simplicity and ease of use, the disclosed method/system is an undeniably promising
alternative to physical cards/expensive biometric readers for verifying the user's
authenticity.
[0094] Unless otherwise defined, all technical and scientific terms used herein have the
same meaning as commonly understood by one ordinary skilled in the art to which this
disclosure belongs. The system, methods, and examples provided herein are illustrative
only and not intended to be limiting.
[0095] While specific language has been used to describe the subject matter, any limitations
arising on account thereto, are not intended. As would be apparent to a person in
the art, various working modifications may be made to the method to implement the
inventive concept as taught herein. The drawings and the forgoing description give
examples of embodiments. Those skilled in the art will appreciate that one or more
of the described elements may well be combined into a single functional element. Alternatively,
certain elements may be split into multiple functional elements. Elements from one
embodiment may be added to another embodiment.
[0096] The embodiments disclosed herein can be implemented using at least one hardware device
and performing network management functions to control the elements.
[0097] The foregoing description of the specific embodiments will so fully reveal the general
nature of the embodiments herein that others can, by applying current knowledge, readily
modify and/or adapt for various applications such specific embodiments without departing
from the generic concept, and, therefore, such adaptations and modifications should
and are intended to be comprehended within the meaning and range of equivalents of
the disclosed embodiments. It is to be understood that the phraseology or terminology
employed herein is for the purpose of description and not of limitation. Therefore,
while the embodiments herein have been described in terms of preferred embodiments,
those skilled in the art will recognize that the embodiments herein can be practiced
with modification within the scope of the embodiments as described herein.
[0098] The following clauses set out features of the invention which may or may not presently
be claimed in this application, but which may form the basis for future amendment
or a divisional application.
- 1. A method at an access reader for verifying authenticity of a user, the method comprising:
detecting, by the access reader, that the user is in proximity to the access reader
based on one of a command received from the user or an electronic communication device,
associated with the user, present within a predefined threshold distance from the
access reader;
transmitting a signal to the electronic communication device in response to detecting
that the user is in proximity to the access reader, wherein the signal is indicative
of verifying the authenticity of the user;
receiving, from the electronic communication device, biometric information associated
with the user for verifying the authenticity of the user after transmitting the signal
to the electronic communication device;
verifying, by the access reader, the authenticity of the user based on verification
of the biometric information with user data stored in a database in communication
with the access reader.
- 2. The method of clause 1, further comprising:
triggering a command to provide access to the user based on the verification of the
authenticity of the user.
- 3. The method of clause 1, further comprising:
recording, by the access reader at the database, an access log associated with the
verification of the authenticity of the user.
- 4. The method of clause 1, further comprising:
establishing a secure wireless communication link with the access reader, wherein
the wireless communication link is one of a Bluetooth communication link, Ultra-wideband
communication link, or another near-field communication link.
- 5. The method of clause 1, wherein receiving the biometric information comprises receiving
a voice signature from the user.
- 6. A method at an electronic communication device for verifying authenticity of a user,
the method comprising:
generating a prompt message for the user to confirm whether to access an access reader
within a vicinity of the electronic communication device;
receiving an input associated with biometric information of the user to access the
access reader in response to the generation of the prompt message; and
transmitting, to the access reader, the input associated with the biometric information
of the user, wherein the biometric information is verified by the access reader to
provide access to the access reader.
- 7. The method of clause 6 further comprising:
prior to generating the prompt message, receiving a signal from the access reader
based on the reception of one of a command received from the user or the electronic
communication device, associated with the user, present within a predefined threshold
distance from the access reader, wherein the signal is indicative of verifying the
authenticity of the user.
- 8. The method of any one of clause 6, wherein receiving the input from the user to access
the access reader comprises receiving an identity of the access reader, from among
the plurality of access readers.
- 9. The method of any one of clause 6, further comprising:
establishing a secure wireless communication link with the access reader, wherein
the wireless communication link is one of a Bluetooth or Ultra-wideband communication
link.
- 10. A system at an access reader for verifying authenticity of a user, the system comprising:
access control engine configured to:
detect that the user is in proximity to the access reader based on one of a command
received from the user or an electronic communication device, associated with the
user, present within a predefined threshold distance from the access reader;
transmit a signal to the electronic communication device in response to detecting
that the user is in proximity to the access reader, wherein the signal is indicative
of verifying the authenticity of the user;
receive, from the electronic communication device, biometric information associated
with the user for verifying the authenticity of the user after transmitting the signal
to the electronic communication device;
verify the authenticity of the user based on verification of the biometric information
with user data stored in a database in communication with the access reader.
- 11. The system of clause 10, wherein the access control engine is further configured
to:
trigger a command to provide access to the user based on the verification of the authenticity
of the user.
- 12. The system of clause 10, wherein the access control engine is further configured
to:
record, by the access reader at the database, an access log associated with the verification
of the authenticity of the user.
- 13. The system of clause 10, wherein the access control engine is further configured
to:
establish a secure wireless communication link with the access reader, wherein the
wireless communication link is one of a Bluetooth communication link, Ultra-wideband
communication link, or another near-field communication link.
- 14. The system of clause 10, wherein to receive the biometric information, the access
control engine is further configured to receive a voice signature from the user.
- 15. A system at an electronic communication device for verifying authenticity of a user,
the system comprising:
access control engine configured to:
generate a prompt message for the user to confirm whether to access an access reader
within a vicinity of the electronic communication device;
receive an input associated with biometric information of the user to access the access
reader in response to the generation of the prompt message; and
transmit, to the access reader, the input associated with the biometric information
of the user, wherein the biometric information is verified by the access reader to
provide access to the access reader.
- 16. The system of clause 15, wherein the access control engine is configured to:
prior to generation of the prompt message, receive a signal from the access reader
based on reception of one of a command received from the user or the electronic communication
device, associated with the user, present within a predefined threshold distance from
the access reader, wherein the signal is indicative of verifying the authenticity
of the user.
- 17. The system of clause 15, wherein to receive the input from the user to access the
access reader, the access control engine is configured to receive an identity of the
access reader, from among the plurality of access readers.
- 18. The system of clause 15, wherein the access control engine is configured to:
establish a secure wireless communication link with the access reader, wherein the
wireless communication link is one of a Bluetooth or Ultra-wideband communication
link.
1. A method (300) at an access reader (100) for verifying authenticity of a user (200A),
the method comprising:
detecting (302), by the access reader (100), that the user is in proximity to the
access reader (100) based on one of a command received from the user or an electronic
communication device (200), associated with the user, present within a predefined
threshold distance from the access reader (100);
transmitting (302) a signal to the electronic communication device (200) in response
to detecting that the user is in proximity to the access reader (100), wherein the
signal is indicative of verifying the authenticity of the user;
receiving (303), from the electronic communication device (200), biometric information
associated with the user for verifying the authenticity of the user after transmitting
the signal to the electronic communication device (200);
verifying (304), by the access reader (100), the authenticity of the user based on
verification of the biometric information with user data stored in a database (500B)
in communication with the access reader (100).
2. The method of claim 1, further comprising:
triggering (307) a command to provide access to the user based on the verification
of the authenticity of the user.
3. The method of claim 1 or 2, further comprising:
recording (308), by the access reader (100) at the database, an access log associated
with the verification of the authenticity of the user.
4. The method of claim 1, 2 or 3, further comprising:
establishing (309) a secure wireless communication link with the access reader (100),
wherein the wireless communication link is one of a Bluetooth communication link,
Ultra-wideband communication link, or another near-field communication link.
5. The method of any preceding claim, wherein receiving the biometric information comprises
receiving a voice signature from the user.
6. A method (400) at an electronic communication device (200) for verifying authenticity
of a user (200A), the method comprising:
generating (402) a prompt message for the user to confirm whether to access an access
reader (100) within a vicinity of the electronic communication device (200);
receiving (403) an input associated with biometric information of the user to access
the access reader (100 in response to the generation of the prompt message; and
transmitting (404), to the access reader (100), the input associated with the biometric
information of the user (200A), wherein the biometric information is verified by the
access reader (100) to provide access to the access reader.
7. The method of claim 6 further comprising:
prior to generating (402) the prompt message, receiving (401) a signal from the access
reader (100) based on the reception of one of a command received from the user (200A)
or the electronic communication device (200), associated with the user, present within
a predefined threshold distance from the access reader (100), wherein the signal is
indicative of verifying the authenticity of the user.
8. The method of claims 6 or 7, wherein receiving (403) the input from the user to access
the access reader (100) comprises receiving an identity of the access reader, from
among the plurality of access readers.
9. The method of claims 6, 7 or 8, further comprising:
establishing a secure wireless communication link with the access reader, wherein
the wireless communication link is one of a Bluetooth or Ultra-wideband communication
link.
10. A system (101) at an access reader for verifying authenticity of a user, the system
comprising:
access control engine (140) configured to:
detect (302) that the user is in proximity to the access reader (100) based on one
of a command received from the user (200A) or an electronic communication device (200),
associated with the user, present within a predefined threshold distance from the
access reader (100);
transmit (302) a signal to the electronic communication device (200) in response to
detecting that the user is in proximity to the access reader (100), wherein the signal
is indicative of verifying the authenticity of the user;
receive (303), from the electronic communication device (200), biometric information
associated with the user (200A) for verifying the authenticity of the user after transmitting
the signal to the electronic communication device (200);
verify (304) the authenticity of the user (200A) based on verification of the biometric
information with user data stored in a database (500B) in communication with the access
reader (100).
11. The system of claim 10, wherein the access control engine (140) is further configured
to carry out the steps according to any of claims 2 to 4.
12. The system of claims 10 or 11, wherein to receive the biometric information, the access
control engine (140) is further configured to receive a voice signature from the user.
13. A system (201) at an electronic communication device (200) for verifying authenticity
of a user (200A), the system comprising:
access control engine (260) configured to:
generate (402) a prompt message for the user to confirm whether to access an access
reader (100) within a vicinity of the electronic communication device (200);
receive (403) an input associated with biometric information of the user (200A) to
access the access reader (100) in response to the generation of the prompt message;
and
transmit (404), to the access reader (100), the input associated with the biometric
information of the user (200A), wherein the biometric information is verified by the
access reader to provide access to the access reader.
14. The system of claim 13, wherein the access control engine (260) is configured to carry
out the steps according to claims 7 or 9.
15. The system of claims 13 or 14, wherein to receive the input from the user to access
the access reader, the access control engine (260) is configured to receive an identity
of the access reader, from among the plurality of access readers.